WASTE Again!

3 Min Read

If you are interested in cryptology, or would just like to pass messages securely without worrying too much (especially corporate messages, while on the road traveling, and using a public wireless network on the airports), you may try WASTE Again.

Note – We had blogged on the Tor Project much earlier and this is a step like that!

From the website-

What is “WASTE again”?

“WASTE again” enables you to create a decentralized and secure private mesh network using an unsecure network, such as the internet. Once the public encryption keys are exchanged, sending messages, creating groupchats and transferring files is easy and secure.

Creating a mesh

To create a mesh you need at least two computers with “WASTE again” installed. During installation, a unique pair of public and private keys for each computer is being generated…  

If you are interested in cryptology, or would just like to pass messages securely without worrying too much (especially corporate messages, while on the road traveling, and using a public wireless network on the airports), you may try WASTE Again.

Note – We had blogged on the Tor Project much earlier and this is a step like that!

From the website-

What is “WASTE again”?

“WASTE again” enables you to create a decentralized and secure private mesh network using an unsecure network, such as the internet. Once the public encryption keys are exchanged, sending messages, creating groupchats and transferring files is easy and secure.

Creating a mesh

To create a mesh you need at least two computers with “WASTE again” installed. During installation, a unique pair of public and private keys for each computer is being generated. Before the first connection can be established, you need to exchange these public keys. These keys enable “WASTE again” to authenticate every connection to other “WASTE again” clients.

After exchanging the keys, you simply type in the computers IP address to connect to. If that computer is located behind a firewall or a NAT-router, you have to create a portmap first to enable incoming connections.

and the features include-

 

Ajay- It is based on the same historical legacy of the PGP ( Pretty Good Privacy) project of the early 1990’s and offers up to 4096 bits of encryption. It offers a simple intuitive interface for a 4-step process in creating private and public key. Combine some John Le Carre novels tradecraft, one-touch keypads and residual creativity 🙂  and your network is securely assured from goodwill hunting.

The downloads are here-http://wasteagain.sourceforge.net/downloads.shtml

Share This Article
Exit mobile version